Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Business

PDF

Security

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 33

Full-Text Articles in Social and Behavioral Sciences

Venue Safety Strategies: Guardrails And The Line-Of-Sight Exemption, Gil Fried, Aneurin Grant Dec 2023

Venue Safety Strategies: Guardrails And The Line-Of-Sight Exemption, Gil Fried, Aneurin Grant

Journal of Applied Sport Management

This piece represents a focused article on safety issues connected to railings at sporting events and why there needs to be considerable action taken to protect fans. Specifically, the authors believe the current line-of-sight exception (minimum 26") allows for railings that are dangerously inadequate to protect fans. It is argued that if sport facility managers and or venues do not proactively address this railing height issue, then architects, building inspectors, and others should seek to change the building code to eliminate the fans continued exposure to unnecessary hazards.


Multi-Functional Job Roles To Support Operations In A Multi-Faceted Jewel Enabled By Ai And Digital Transformation, Steven M. Miller Oct 2022

Multi-Functional Job Roles To Support Operations In A Multi-Faceted Jewel Enabled By Ai And Digital Transformation, Steven M. Miller

Research Collection School Of Computing and Information Systems

In this story, we highlight the way in which the use of AI enabled support systems, together with work process digital transformation and innovative approaches to job redesign, have combined to dramatically change the nature of the work of the front-line service staff who protect and support the facility and visitors at the world’s most iconic airport mall and lifestyle destination.


Digital Only Banks The Changing Face Of Global Banking: Challenges, Opportunities And Aml/Cft Implications For Nigeria, David N. Odu Oct 2021

Digital Only Banks The Changing Face Of Global Banking: Challenges, Opportunities And Aml/Cft Implications For Nigeria, David N. Odu

Bullion

The drastic digitization brought about by evolution of technology in the world has changed almost every sphere of human life with the most recent effect being moved to cashless economy, while the role of digitization in the banking sector is altering customer demand and preferences, banks are becoming digitally oriented to meet the forces of demand and supply. This has led to the birth of digital-only also called challenger bankers or branches banks as they operate without a physical location, only have a location for admin purposes or hosting their servers. This growing wave of consumer oriented banking institutions focuses …


One October Tragedy In Las Vegas: An Overview Of Tourists' Perceptions, Mehmet Erdem, Saeed Vayghan, Billy Bai Oct 2020

One October Tragedy In Las Vegas: An Overview Of Tourists' Perceptions, Mehmet Erdem, Saeed Vayghan, Billy Bai

Hospitality Faculty Research

Purpose: This study seeks to examine Las Vegas visitors’ perception about security in Las Vegas and the perceived risks associated with traveling to Las Vegas following the One October mass shooting. It also aims to explore potential Las Vegas visitors ‘attitudes towards the proactive security measures implemented by Las Vegas resorts after the One October tragedy. Methods: The study is descriptive in nature. The data was collected through a web-based survey that comprised a national sample of 414 adults from the United States. Results: The results indicate that despite the tragic One October mass shooting in Las Vegas and the …


The Future Of Work Now: The Multi-Faceted Mall Security Guard At A Multi-Faceted Jewel, Thomas H. Davenport, Steven M. Miller Sep 2020

The Future Of Work Now: The Multi-Faceted Mall Security Guard At A Multi-Faceted Jewel, Thomas H. Davenport, Steven M. Miller

Research Collection School Of Computing and Information Systems

One of the most frequently-used phrases at business events these days is “the future of work.” It’s increasingly clear that artificial intelligence and other new technologies will bring substantial changes in work tasks and business processes. But while these changes are predicted for the future, they’re already present in many organizations for many different jobs. The job and incumbents described below are an example of this phenomenon. Steve Miller of Singapore Management University and I co-authored the story.


Brave New World - Reslience, Rhonda S. Binda Aug 2020

Brave New World - Reslience, Rhonda S. Binda

Open Educational Resources

The trifecta of globalization, urbanization and digitization have created new opportunities and challenges across our nation, cities, boroughs and urban centers. Cities are in a unique position at the center of commerce and technology becoming hubs for innovation and practical application of emerging technology. In this rapidly changing 24/7 digitized world, city governments worldwide are leveraging innovation and technology to become more effective, efficient, transparent and to be able to better plan for and anticipate the needs of its citizens, businesses and community organizations. This class will provide the framework for how cities and communities can become smarter and more …


La Configuración De La Política Exterior China Desde El Nuevo Concepto De Seguridad: Análisis De La Nueva Ruta De La Seda, Gabriela Oviedo Moreno, Cindy Lorena Vera Pinzón Jan 2020

La Configuración De La Política Exterior China Desde El Nuevo Concepto De Seguridad: Análisis De La Nueva Ruta De La Seda, Gabriela Oviedo Moreno, Cindy Lorena Vera Pinzón

Negocios y Relaciones Internacionales

En las últimas décadas el gobierno chino ha tenido un rol protagónico en la Sociedad Internacional que implica la modificación de su estrategia de política exterior. Al hacerlo redefine el concepto de seguridad transnacionalmente, involucrando a la par de la dimensión militar, dinámicas económicas, sociales y culturales. Un ejemplo de dicha reconfiguración es la emergencia del proyecto mega regional desarrollado en el año 2013, denominado la Nueva Ruta de la Seda (CYR), iniciativa que retoma un proyecto histórico de carácter estratégico donde se visualiza el tránsito de una potencia de alcance regional a una de transcendencia global. La presente investigación …


Data Disparity: Tiered Pricing As An Alternative To Consumer Iot Data Privacy Regulations, Matthew Lostocco Jan 2019

Data Disparity: Tiered Pricing As An Alternative To Consumer Iot Data Privacy Regulations, Matthew Lostocco

Honors Theses and Capstones

In recent years, Internet of Things (IoT) devices have exploded on the consumer scene. These emerging products bring new technological capabilities into our everyday lives. IoT is projected to contribute anywhere from $4-11 trillion to the global economy and companies are investing billions of dollars into the technology. However, with the vast amount of data that IoT devices collect, consumers are burdening the risk of having their personal data breached or sold to third parties. This paper first identifies why consumers may be weary or willing towards providing their personal data and how unconscious biases in the purchasing process cause …


Security Risk Tolerance In Mobile Payment: A Trade-Off Framework, Yong Chen Jul 2018

Security Risk Tolerance In Mobile Payment: A Trade-Off Framework, Yong Chen

Information Technology & Decision Sciences Theses & Dissertations

Security is identified as a major barrier for consumers in adopting mobile payment. Although existing literature has incorporated security into the Technology Acceptance Model (TAM), the Unified Theory of Acceptance, and the Use of Technology (UTAUT) and it has investigated the way in which security affects consumers’ acceptance of mobile payment, security is a factor only in diverse research models. Studies of mobile payment that focus on security are not available. Additionally, previous studies of mobile payment are based on Direct Carrier Billing- (DCB)-based mobile payment or Near Field Communication- (NFC)-based mobile payment. The results regarding security might not be …


Combating Workplace Violence: An Evidence Based Initiative, Diana L. Giordano May 2017

Combating Workplace Violence: An Evidence Based Initiative, Diana L. Giordano

Evidence-Based Practice Project Reports

Patient/visitor violence against healthcare (HC) employees is a type of workplace violence (WPV) and considered a dangerous hazard within HC occupations (Bureau of Labor Statistics, 2015). Lack of recognition of the true incidence and underreporting of WPV may contribute to a false sense of security within a HC facility (HCF). Therefore, fully addressing the problem may be met with administrative resistance, resulting in poor employee perceptions of support and commitment for a zero-violence environment. A retrospective analysis was conducted on the HCF’s online incident reports, security request calls, and data from a previously deployed WPV employee survey. The emergency department …


Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian Jan 2017

Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian

Journal of International Technology and Information Management

The rapid growth of AI systems has implications on a wide variety of fields. It can prove to be a boon to disparate fields such as healthcare, education, global logistics and transportation, to name a few. However, these systems will also bring forth far-reaching changes in employment, economy and security. As AI systems gain acceptance and become more commonplace, certain critical questions arise: What are the legal and security ramifications of the use of these new technologies? Who can use them, and under what circumstances? What is the safety of these systems? Should their commercialization be regulated? What are the …


Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan Dec 2016

Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan

International Journal of Nuclear Security

Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.


The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran Nov 2016

The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran

International Journal of Nuclear Security

In the emerging field of nuclear security, those responsible for education and training are constantly seeking to identify and engage with tools and approaches that provide for a constructive learning environment. In this context, this paper explores the nature and value of Tabletop exercises (TTX) and how they can be applied in the nuclear security context. On the one hand, the paper dissects the key components of the TTX and considers the broader pedagogical benefits of this teaching method. On the other hand, the paper draws lessons from the authors’ experience of running TTXs as part of nuclear security professional …


An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris Oct 2016

An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris

Journal of International Technology and Information Management

The explosive growth and rapid proliferation of smartphones and other mobile

devices that access data over communication networks has necessitated advocating

and implementing security constraints for the purpose of abetting safe computing.

Remote data access using mobile devices is particularly popular among students at

institutions of higher education. To ensure safe harbor for constituents, it is

imperative for colleges and universities to establish, disseminate, and enforce

mobile device security artifacts, where artifacts is defined as policies, procedures,

guidelines or other documented or undocumented protocols. The purpose of this

study is to explore the existence of, specific content of, and the …


Overcoming Fraud & Dishonesty In The Hospitality Industry, James Peter Murphy Feb 2016

Overcoming Fraud & Dishonesty In The Hospitality Industry, James Peter Murphy

Conference papers

The licensed industry is an increasingly competitive market place, many bars have responded by empowering staff and undertaking structural and management reforms in recent years. Undoubtedly, these changes have significantly raised the levels of customer service and enhanced customer satisfaction. Paradoxically these changes, combined with the responsibilities allocated to bar staff and management to supervise and manage bars with autonomous control have created more fertile conditions, scope and opportunity for dishonest actions by staff members.

The way licensed premises approach the issue of staff fraud is changing in response to the increased risk. Many bars have historically been anxious to …


Identifications Of Challenges And Success Factors Of Females Entering And Advancing In The Profession Of Emergency Management, Audra Cronen Jan 2016

Identifications Of Challenges And Success Factors Of Females Entering And Advancing In The Profession Of Emergency Management, Audra Cronen

Online Theses and Dissertations

This thesis focuses on how women in the emergency management field have identified and overcome challenges when entering and advancing in the profession. The two research questions were:

• What barriers have females experienced when entering and advancing in the field of emergency management?

• In what ways have females overcome barriers when entering and advancing in the field of emergency management?

These questions were answered by five women who work in the field of emergency management and responded to a series of interview questions. These women made it clear that while this is a predominately male-dominated field of work, …


2015 Food And Function: An Assessment Of The Capacity Of Food Pantry Programs In San Diego County, Mary Jo Schumann, Crystal Trull, Carolyn Noack Aug 2015

2015 Food And Function: An Assessment Of The Capacity Of Food Pantry Programs In San Diego County, Mary Jo Schumann, Crystal Trull, Carolyn Noack

Food Security

Food pantry programs play a critical role in meeting a basic need for thousands of individuals and families each year. They are the front-line support mechanism for providing short-term or emergency assistance to those struggling with food insecurity. San Diego County has a wide variety of food pantry programs that are helping to meet the need of thousands of hungry residents across the region.

In 2012, several of the major emergency food provider agencies in San Diego County gathered to discuss how collaboration could support cost-saving efficiencies in the food distribution network, and subcommittees were formed to collaborate on achieving …


Bringing Fear To The Perpetrators – Humanitarian Cyber Operations As Evidence Gathering And Deterrence, Jan Kallberg Jun 2015

Bringing Fear To The Perpetrators – Humanitarian Cyber Operations As Evidence Gathering And Deterrence, Jan Kallberg

Jan Kallberg

Humanitarian cyber operations would allow democratic states to utilise cyber operations as a humanitarian intervention to capture information and create a foundation for decision making for collective international action supported by humanitarian international law. This follows the legal doctrine of responsibility to protect, which relies first on the nation state itself but when the state fails to protect its citizens, then the international community can act ignoring the repressive or failed states national sovereignty. Another support for humanitarian cyber operations is the ability to capture evidence to support future prosecution for crimes against humanity. The weakest link in the chain …


Slides: Ag Water Sharing: Legal Challenges And Considerations, Peter D. Nichols Jun 2015

Slides: Ag Water Sharing: Legal Challenges And Considerations, Peter D. Nichols

Innovations in Managing Western Water: New Approaches for Balancing Environmental, Social and Economic Outcomes (Martz Summer Conference, June 11-12)

Presenter: Peter D. Nichols, Esq., Partner, Berg, Hill, Greenleaf and Ruscitti, Boulder, CO

25 slides


Interagency Coordination Of Security Operations In A Large U.S. Seaport, Edmund Levy Jan 2015

Interagency Coordination Of Security Operations In A Large U.S. Seaport, Edmund Levy

Walden Dissertations and Doctoral Studies

Protecting U.S. transportation hubs against a wide variety of security threats, while avoiding undue interference with the normal operations of the hubs, is one of the greatest challenges facing security agencies. The problem addressed in this study was the limited information on the contributing factors to seaport security. The purpose of this case study was to explore issues that can inhibit efficiency of security agency operation and collaboration and to identify actions that have enhanced collaboration. Based on theories of organizational development, leadership, and security tradecraft, this study examined the activities related to maintenance of security at a large California …


How Many Credit Card Frauds Must We Endure Before Security Improves?, Maritza Martinez Mar 2014

How Many Credit Card Frauds Must We Endure Before Security Improves?, Maritza Martinez

UCF Forum

Yes, it can happen to you…


Hospitality Review Volume 31 Issue 2 2013, Fiu Hospitality Review Nov 2013

Hospitality Review Volume 31 Issue 2 2013, Fiu Hospitality Review

Hospitality Review

No abstract provided.


Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael Jun 2013

Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael

Associate Professor Katina Michael

It was in July 2012 that Steve Mann and I corresponded on the possibility of hosting a conference on wearable computing in Toronto, Canada. Steve had just returned home from a family holiday to France and publicly blogged about an unfortunate incident that had happened to him while away. On 17th July 2012 he posted: “Physical assault by McDonald’s for wearing Digital Eye Glass”. We both knew the timing was right for such an event that was not just a technical engineering or applied orientation on the theme of smart worlds, but an event that would grapple with the dichotomies …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael Apr 2012

Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael

Associate Professor Katina Michael

With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.


Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael Jan 2012

Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael

Associate Professor Katina Michael

In an age of outsourcing tasks that are not considered to be a core competency of the business, organisations have often relied on external consultants for matters pertaining to security. In actual fact, most companies could have utilized existing skill-sets in-house to produce a security risk management program, if only they knew what steps to take, and how to go about it all. Evan Wheeler in his book on information security risk management does just that- he equips professionals tasked with security, with the thinking required to create a program that is more preoccupied with the complex strategic-level questions than …


Money Buys Financial Security And Psychological Need Satisfaction: Testing Need Theory In Affluence, Ryan T. Howell, Mark Kurai, Wing Yin Leona Tam Jan 2012

Money Buys Financial Security And Psychological Need Satisfaction: Testing Need Theory In Affluence, Ryan T. Howell, Mark Kurai, Wing Yin Leona Tam

Faculty of Commerce - Papers (Archive)

The most prominent theory to explain the curvilinear relationship between income and subjective well-being (SWB) is need theory, which proposes that increased income and wealth can lead to increased well-being in poverty because money is used to satisfy basic physiological needs. The present study tests the tenets of need theory by proposing that money can buy happiness beyond poverty if the money satisfies higher-order needs. Findings indicate that in older adults (n = 1,284), as economic standing rises, so do individual perceptions of financial security (a safety need), which in turn increases overall life satisfaction. Further, a path model tested …


The Contribution Of A Satellite Market To Price Discovery: Evidence From The Singapore Exchange, Vicentiu Covrig, David K. Ding, Buen Sin Low Oct 2004

The Contribution Of A Satellite Market To Price Discovery: Evidence From The Singapore Exchange, Vicentiu Covrig, David K. Ding, Buen Sin Low

Research Collection Lee Kong Chian School Of Business

The Singapore Exchange (SGX), a small satellite market, successfully competes with a large home market, the Osaka Securities Exchange (OSE), in trading the Nikkei 225 futures index. In this paper, we investigate the contribution of the SGX to price discovery and shed light on the reasons for its continued success. Evidence is provided from information revelation and price discovery of three competing but informationally linked markets of the Nikkei 225 index - domestic spot (Tokyo Stock Exchange), domestic futures (OSE), and foreign futures (SGX), which represents the satellite market. Overall, the futures market contributes 77% to price discovery, with the …


Is Virtual Conferencing Virtually The Same?, Ibpp Editor Jun 2003

Is Virtual Conferencing Virtually The Same?, Ibpp Editor

International Bulletin of Political Psychology

The article discusses the pros and cons of virtual conferencing and the optimizing of decision making in a security context.